Analysis

  • max time kernel
    190s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 04:27

General

  • Target

    250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743.exe

  • Size

    1009KB

  • MD5

    63280dedabfe7caec283920f1b5ee3dd

  • SHA1

    5efc119e54f35770a9dae6997b550982c82cc86b

  • SHA256

    250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743

  • SHA512

    45e0108743f5922352980565df9f24ac1bddf8b15aca4e00a58affd8bc9136eee5144fa53fa91c2a76cd0bdbbc366b41f9b9d978da88328ef7c91ff55c6a9983

  • SSDEEP

    12288:RKfc7b5LkodZkB0YH6lmtSOE2UfQS/x1W5bUPodfCEVYHBF60GRGq4B:RKE7ttoBEmN3a/x1wBYh0I

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Windows\system32\backgroundTaskHost.exe
      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
      2⤵
        PID:764
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
        2⤵
          PID:4924
        • C:\Windows\system32\BackgroundTransferHost.exe
          "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
          2⤵
            PID:828
          • C:\Windows\system32\BackgroundTransferHost.exe
            "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
            2⤵
              PID:3500
            • C:\Windows\system32\BackgroundTransferHost.exe
              "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
              2⤵
                PID:4416
            • C:\Users\Admin\AppData\Local\Temp\250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743.exe
              "C:\Users\Admin\AppData\Local\Temp\250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743.exe"
              1⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3908
              • C:\Users\Admin\AppData\Local\Temp\250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743.exe
                "C:\Users\Admin\AppData\Local\Temp\250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2848
                • C:\Users\Admin\AppData\Local\Temp\250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743.exe
                  "C:\Users\Admin\AppData\Local\Temp\250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743.exe"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4636
            • C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
              C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2164
              • C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
                C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2360
                • C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
                  C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3516

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\USOPrivate\nxzrgth
              Filesize

              654B

              MD5

              fa1027bd794cd5a854733bdc46b6afa8

              SHA1

              9ba5b3d79c0438ab18cea30ba2d24222158800bc

              SHA256

              34cfe0dfbb16d5f8f2f690be8d17e86adb736fbd5391eaae3391fc3c2f6ac2fc

              SHA512

              f189e2fb8dc3c86d25c9caa6f6f2f4b19ead8a5cb7ea0a751e535e9120e3796b7a1b481236c4904cdac7e2d1eaaf904ef755e284cd539dc0f7cb50819ba39648

            • C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
              Filesize

              1009KB

              MD5

              63280dedabfe7caec283920f1b5ee3dd

              SHA1

              5efc119e54f35770a9dae6997b550982c82cc86b

              SHA256

              250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743

              SHA512

              45e0108743f5922352980565df9f24ac1bddf8b15aca4e00a58affd8bc9136eee5144fa53fa91c2a76cd0bdbbc366b41f9b9d978da88328ef7c91ff55c6a9983

            • C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
              Filesize

              1009KB

              MD5

              63280dedabfe7caec283920f1b5ee3dd

              SHA1

              5efc119e54f35770a9dae6997b550982c82cc86b

              SHA256

              250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743

              SHA512

              45e0108743f5922352980565df9f24ac1bddf8b15aca4e00a58affd8bc9136eee5144fa53fa91c2a76cd0bdbbc366b41f9b9d978da88328ef7c91ff55c6a9983

            • C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
              Filesize

              1009KB

              MD5

              63280dedabfe7caec283920f1b5ee3dd

              SHA1

              5efc119e54f35770a9dae6997b550982c82cc86b

              SHA256

              250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743

              SHA512

              45e0108743f5922352980565df9f24ac1bddf8b15aca4e00a58affd8bc9136eee5144fa53fa91c2a76cd0bdbbc366b41f9b9d978da88328ef7c91ff55c6a9983

            • C:\Users\Admin\AppData\Local\Temp\vhwmdff.exe
              Filesize

              1009KB

              MD5

              63280dedabfe7caec283920f1b5ee3dd

              SHA1

              5efc119e54f35770a9dae6997b550982c82cc86b

              SHA256

              250684f6de27ae57738e361aa0b3cc967f27e8d017817dcef0199f5cbd0e7743

              SHA512

              45e0108743f5922352980565df9f24ac1bddf8b15aca4e00a58affd8bc9136eee5144fa53fa91c2a76cd0bdbbc366b41f9b9d978da88328ef7c91ff55c6a9983

            • memory/764-160-0x0000000000000000-mapping.dmp
            • memory/788-158-0x000000002C240000-0x000000002C2A9000-memory.dmp
              Filesize

              420KB

            • memory/828-162-0x0000000000000000-mapping.dmp
            • memory/2360-146-0x0000000000000000-mapping.dmp
            • memory/2360-157-0x0000000000400000-0x0000000001215000-memory.dmp
              Filesize

              14.1MB

            • memory/2360-150-0x0000000000400000-0x0000000001215000-memory.dmp
              Filesize

              14.1MB

            • memory/2360-149-0x0000000000400000-0x0000000001215000-memory.dmp
              Filesize

              14.1MB

            • memory/2848-134-0x0000000000400000-0x0000000001215000-memory.dmp
              Filesize

              14.1MB

            • memory/2848-133-0x0000000000400000-0x0000000001215000-memory.dmp
              Filesize

              14.1MB

            • memory/2848-141-0x0000000001380000-0x00000000013B4000-memory.dmp
              Filesize

              208KB

            • memory/2848-135-0x0000000000400000-0x0000000001215000-memory.dmp
              Filesize

              14.1MB

            • memory/2848-143-0x0000000000400000-0x0000000001215000-memory.dmp
              Filesize

              14.1MB

            • memory/2848-132-0x0000000000000000-mapping.dmp
            • memory/3500-163-0x0000000000000000-mapping.dmp
            • memory/3516-151-0x0000000000000000-mapping.dmp
            • memory/3516-156-0x0000000000780000-0x0000000000889000-memory.dmp
              Filesize

              1.0MB

            • memory/4416-164-0x0000000000000000-mapping.dmp
            • memory/4636-142-0x0000000000400000-0x0000000000422E00-memory.dmp
              Filesize

              139KB

            • memory/4636-140-0x0000000000870000-0x0000000000979000-memory.dmp
              Filesize

              1.0MB

            • memory/4636-137-0x0000000000400000-0x0000000000423000-memory.dmp
              Filesize

              140KB

            • memory/4636-139-0x0000000000790000-0x0000000000868000-memory.dmp
              Filesize

              864KB

            • memory/4636-136-0x0000000000000000-mapping.dmp
            • memory/4924-161-0x0000000000000000-mapping.dmp